{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T04:29:28Z","timestamp":1772166568098,"version":"3.50.1"},"reference-count":110,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2024,8,27]],"date-time":"2024-08-27T00:00:00Z","timestamp":1724716800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2024,8,27]],"date-time":"2024-08-27T00:00:00Z","timestamp":1724716800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"funder":[{"DOI":"10.13039\/501100003725","name":"National Research Foundation of Korea","doi-asserted-by":"publisher","award":["MIS, RS-2023-00237300"],"award-info":[{"award-number":["MIS, RS-2023-00237300"]}],"id":[{"id":"10.13039\/501100003725","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100023231","name":"National Institute for International Education","doi-asserted-by":"publisher","award":["RS-2023-00237300"],"award-info":[{"award-number":["RS-2023-00237300"]}],"id":[{"id":"10.13039\/501100023231","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Wireless Com Network"],"DOI":"10.1186\/s13638-024-02396-y","type":"journal-article","created":{"date-parts":[[2024,8,27]],"date-time":"2024-08-27T12:02:02Z","timestamp":1724760122000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["A dynamic symmetric key generation at wireless link layer: information-theoretic perspectives"],"prefix":"10.1186","volume":"2024","author":[{"given":"David Samuel","family":"Bhatti","sequence":"first","affiliation":[]},{"given":"Shahzad","family":"Saleem","sequence":"additional","affiliation":[]},{"given":"Heung-No","family":"Lee","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8366-3533","authenticated-orcid":false,"given":"Ki-Il","family":"Kim","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,8,27]]},"reference":[{"key":"2396_CR1","doi-asserted-by":"publisher","DOI":"10.3390\/s22207722","author":"DS Bhatti","year":"2022","unstructured":"D.S. Bhatti et al., A survey on wireless wearable body area networks: a perspective of technology and economy. Sensors (2022). https:\/\/doi.org\/10.3390\/s22207722","journal-title":"Sensors"},{"key":"2396_CR2","unstructured":"I. AlShourbaji, An overview of wireless local area network (WLAN). CoRR arXiv:1303.1882 (2013)"},{"key":"2396_CR3","doi-asserted-by":"publisher","DOI":"10.1002\/9780470403686","volume-title":"Emerging Wireless LANs, Wireless PANs, and Wireless MANs: IEEE 802.11, IEEE 802.15, 802.16 Wireless Standard Family","author":"Y Xiao","year":"2009","unstructured":"Y. Xiao, Y. Pan, Emerging Wireless LANs, Wireless PANs, and Wireless MANs: IEEE 802.11, IEEE 802.15, 802.16 Wireless Standard Family, 1st edn. (Wiley Publishing, New York, 2009)","edition":"1"},{"key":"2396_CR4","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1109\/MWC.2023.10077227","volume":"30","author":"B Rong","year":"2023","unstructured":"B. Rong, Security in wireless communication networks. IEEE Wirel. Commun. 30, 10\u201311 (2023). https:\/\/doi.org\/10.1109\/MWC.2023.10077227","journal-title":"IEEE Wirel. Commun."},{"key":"2396_CR5","doi-asserted-by":"publisher","first-page":"614","DOI":"10.1109\/ACCESS.2016.2521718","volume":"4","author":"J Zhang","year":"2016","unstructured":"J. Zhang, T.Q. Duong, A. Marshall, R. Woods, Key generation from wireless channels: a review. IEEE Access 4, 614\u2013626 (2016). https:\/\/doi.org\/10.1109\/ACCESS.2016.2521718","journal-title":"IEEE Access"},{"key":"2396_CR6","doi-asserted-by":"publisher","first-page":"207","DOI":"10.1006\/dspr.1996.0023","volume":"6","author":"AA Hassan","year":"1996","unstructured":"A.A. Hassan, W.E. Stark, J.E. Hershey, S. Chennakeshu, Cryptographic key agreement for mobile radio. Digital Signal Process. 6, 207\u2013212 (1996). https:\/\/doi.org\/10.1006\/dspr.1996.0023","journal-title":"Digital Signal Process."},{"key":"2396_CR7","doi-asserted-by":"crossref","unstructured":"A. Varshavsky, A. Scannell, A. LaMarca, E. de Lara, Amigo: Proximity-based authentication of mobile devices, in UbiComp Ubiquitous Computing, pp. 253\u2013270. (Springer, Berlin, 2007)","DOI":"10.1007\/978-3-540-74853-3_15"},{"key":"2396_CR8","doi-asserted-by":"publisher","unstructured":"A. Kalamandeen, A. Scannell, E. de\u00a0Lara, A. Sheth, A. LaMarca, Ensemble: Cooperative proximity-based authentication, in Proceedings of the 8th International Conference on Mobile Systems, Applications, and Services, MobiSys \u201910, pp. 331\u2013344 (ACM, New York, 2010). https:\/\/doi.org\/10.1145\/1814433.1814466","DOI":"10.1145\/1814433.1814466"},{"key":"2396_CR9","doi-asserted-by":"crossref","unstructured":"S. Xiao, W. Gong, D. Towsley, Secure wireless communication with dynamic secrets, in  Proceedings of the 29th Conference on Information Communications, INFOCOM\u201910, p. 1568\u20131576 (IEEE Press, Piscataway, 2010)","DOI":"10.1109\/INFCOM.2010.5461974"},{"key":"2396_CR10","doi-asserted-by":"publisher","first-page":"24242","DOI":"10.1109\/ACCESS.2020.2970147","volume":"8","author":"DS Bhatti","year":"2020","unstructured":"D.S. Bhatti, S. Saleem, Ephemeral secrets: multi-party secret key acquisition for secure IEEE 802.11 mobile ad hoc communication. IEEE Access 8, 24242\u201324257 (2020). https:\/\/doi.org\/10.1109\/ACCESS.2020.2970147","journal-title":"IEEE Access"},{"key":"2396_CR11","doi-asserted-by":"publisher","first-page":"7309","DOI":"10.1109\/ACCESS.2023.3238573","volume":"11","author":"DV Linh","year":"2023","unstructured":"D.V. Linh, V.V. Yem, Key generation technique based on channel characteristics for MIMO-OFDM wireless communication systems. IEEE Access 11, 7309\u20137319 (2023). https:\/\/doi.org\/10.1109\/ACCESS.2023.3238573","journal-title":"IEEE Access"},{"key":"2396_CR12","doi-asserted-by":"publisher","first-page":"737","DOI":"10.1109\/TIFS.2011.2123093","volume":"6","author":"Y Abdallah","year":"2011","unstructured":"Y. Abdallah, M.A. Latif, M. Youssef, A. Sultan, H. El Gamal, Keys through ARQ: Theory and practice. IEEE Trans. Inf. Forensics Secur. 6, 737\u2013751 (2011). https:\/\/doi.org\/10.1109\/TIFS.2011.2123093","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"2396_CR13","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1186\/s13638-019-1634-7","volume":"2020","author":"R Lin","year":"2020","unstructured":"R. Lin, L. Xu, H. Fang, C. Huang, Efficient physical layer key generation technique in wireless communications. EURASIP J. Wirel. Commun. Netw. 2020, 13 (2020). https:\/\/doi.org\/10.1186\/s13638-019-1634-7","journal-title":"EURASIP J. Wirel. Commun. Netw."},{"key":"2396_CR14","doi-asserted-by":"publisher","first-page":"2692","DOI":"10.1109\/TIFS.2020.2974621","volume":"15","author":"N Aldaghri","year":"2020","unstructured":"N. Aldaghri, H. Mahdavifar, Physical layer secret key generation in static environments. IEEE Trans. Inf. Forensics Secur. 15, 2692\u20132705 (2020). https:\/\/doi.org\/10.1109\/TIFS.2020.2974621","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"2396_CR15","doi-asserted-by":"publisher","first-page":"1868","DOI":"10.1109\/TCOMM.2020.3040434","volume":"69","author":"F Rottenberg","year":"2021","unstructured":"F. Rottenberg, T.-H. Nguyen, J.-M. Dricot, F. Horlin, J. Louveaux, CSI-based versus RSS-based secret-key generation under correlated eavesdropping. IEEE Trans. Commun. 69, 1868\u20131881 (2021). https:\/\/doi.org\/10.1109\/TCOMM.2020.3040434","journal-title":"IEEE Trans. Commun."},{"key":"2396_CR16","doi-asserted-by":"publisher","first-page":"5304","DOI":"10.1007\/s10489-022-03777-w","volume":"53","author":"J Zhou","year":"2023","unstructured":"J. Zhou, X. Zeng, Physical-layer secret key generation based on domain-adversarial training of autoencoder for spatial correlated channels. Appl. Intell. 53, 5304\u20135319 (2023). https:\/\/doi.org\/10.1007\/s10489-022-03777-w","journal-title":"Appl. Intell."},{"key":"2396_CR17","doi-asserted-by":"publisher","unstructured":"L. Czap, V.M. Prabhakaran, C. Fragouli, S. Diggavi, Secret message capacity of erasure broadcast channels with feedback, in 2011 IEEE Information Theory Workshop (ITW), pp. 65\u201369. https:\/\/doi.org\/10.1109\/ITW.2011.6089579 (IEEE, Paraty, 2011)","DOI":"10.1109\/ITW.2011.6089579"},{"key":"2396_CR18","doi-asserted-by":"publisher","first-page":"1","DOI":"10.5120\/15970-4720","volume":"92","author":"A Puri","year":"2014","unstructured":"A. Puri, S. Kumar, Error control codes: a novel solution for secret key generation and key refreshment problem. Int. J. Comput. Appl. 92, 1\u20136 (2014). https:\/\/doi.org\/10.5120\/15970-4720","journal-title":"Int. J. Comput. Appl."},{"key":"2396_CR19","doi-asserted-by":"publisher","first-page":"241","DOI":"10.1145\/2955095","volume":"16","author":"Y Zhang","year":"2016","unstructured":"Y. Zhang, Y. Xiang, X. Huang, Password-authenticated group key exchange: a cross-layer design. ACM Trans. Int. Technol. 16, 241\u20132420 (2016). https:\/\/doi.org\/10.1145\/2955095","journal-title":"ACM Trans. Int. Technol."},{"key":"2396_CR20","doi-asserted-by":"publisher","first-page":"1482","DOI":"10.1109\/TII.2016.2610950","volume":"13","author":"N Saxena","year":"2017","unstructured":"N. Saxena, S. Grijalva, Dynamic secrets and secret keys based scheme for securing last mile smart grid wireless communication. IEEE Trans. Ind. Inf. 13, 1482\u20131491 (2017). https:\/\/doi.org\/10.1109\/TII.2016.2610950","journal-title":"IEEE Trans. Ind. Inf."},{"key":"2396_CR21","unstructured":"Riihikallio, P. Tuning your Wi-Fi by adjusting transfer rates. Last updated: 17th Sept.. 2018, Accessed on Dec. 2019"},{"key":"2396_CR22","unstructured":"Ergen, M. IEEE 802.11 tutorial (2002)"},{"key":"2396_CR23","doi-asserted-by":"publisher","unstructured":"S. Jana, et\u00a0al. On the effectiveness of secret key extraction from wireless signal strength in real environments, in Proceedings of the 15th Annual International Conference on Mobile Computing and Networking, MobiCom \u201909, pp. 321\u2013332. https:\/\/doi.org\/10.1145\/1614320.1614356 (ACM, New York, 2009)","DOI":"10.1145\/1614320.1614356"},{"key":"2396_CR24","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1109\/MWC.2011.5999759","volume":"18","author":"K Ren","year":"2011","unstructured":"K. Ren, H. Su, Q. Wang, Secret key generation exploiting channel characteristics in wireless communications. IEEE Wirel. Commun. 18, 6\u201312 (2011). https:\/\/doi.org\/10.1109\/MWC.2011.5999759","journal-title":"IEEE Wirel. Commun."},{"key":"2396_CR25","doi-asserted-by":"publisher","first-page":"2571","DOI":"10.1109\/TWC.2008.070194","volume":"7","author":"L Xiao","year":"2008","unstructured":"L. Xiao, L.J. Greenstein, N.B. Mandayam, W. Trappe, Using the physical layer for wireless authentication in time-variant channels. IEEE Trans. Wireless Commun. 7, 2571\u20132579 (2008)","journal-title":"IEEE Trans. Wireless Commun."},{"key":"2396_CR26","doi-asserted-by":"publisher","DOI":"10.1155\/2015\/106360","author":"T Mazloum","year":"2015","unstructured":"T. Mazloum, A. Sibille, Analysis of secret key randomness exploiting the radio channel variability. Int. J. Antennas Propag. (2015). https:\/\/doi.org\/10.1155\/2015\/106360","journal-title":"Int. J. Antennas Propag."},{"issue":"13","key":"2396_CR27","doi-asserted-by":"publisher","first-page":"2017","DOI":"10.1155\/2017\/7393526","volume":"1","author":"L Cheng","year":"2017","unstructured":"L. Cheng et al., Efficient physical-layer secret key generation and authentication schemes based on wireless channel-phase. Mob. Inf. Syst. 1(13), 2017 (2017). https:\/\/doi.org\/10.1155\/2017\/7393526","journal-title":"Mob. Inf. Syst."},{"key":"2396_CR28","doi-asserted-by":"publisher","unstructured":"I. Safaka, C. Fragouli, K. Argyraki, S. Diggavi, Creating shared secrets out of thin air, in Proceedings of the 11th ACM Workshop on Hot Topics in Networks, HotNets-XI, pp. 73\u201378 (ACM, New York, 2012). https:\/\/doi.org\/10.1145\/2390231.2390244","DOI":"10.1145\/2390231.2390244"},{"key":"2396_CR29","unstructured":"M.J. Siavoshani, et\u00a0al. Exchanging secrets without using cryptography. CoRR arXiv:1105.4991 (2012)"},{"key":"2396_CR30","doi-asserted-by":"publisher","first-page":"422","DOI":"10.1145\/362686.362692","volume":"13","author":"BH Bloom","year":"1970","unstructured":"B.H. Bloom, Space time trade-offs in hash coding with allowable errors. Commun. ACM 13, 422\u2013426 (1970). https:\/\/doi.org\/10.1145\/362686.362692","journal-title":"Commun. ACM"},{"key":"2396_CR31","unstructured":"A. Broder, M. Mitzenmacher, A.B.I.M. Mitzenmacher, Network applications of bloom filters: a survey, in Internet Mathematics, pp. 636\u2013646 (2002)"},{"key":"2396_CR32","doi-asserted-by":"publisher","first-page":"4047","DOI":"10.1016\/j.comnet.2013.09.003","volume":"57","author":"S Geravand","year":"2013","unstructured":"S. Geravand, M. Ahmadi, Survey bloom filter applications in network security: a state-of-the-art survey. Comput. Netw. 57, 4047\u20134064 (2013). https:\/\/doi.org\/10.1016\/j.comnet.2013.09.003","journal-title":"Comput. Netw."},{"key":"2396_CR33","unstructured":"D. Randall, Bloom filters and hashing (2006). Lecture and notes by: Alessio Guerrieri and Wei Jin on CS 6550 Design and Analysis of Algorithms: Accessed on 15th Oct. 2018"},{"key":"2396_CR34","doi-asserted-by":"publisher","unstructured":"H. Marais, K. Bharat, Supporting cooperative and personal surfing with a desktop assistant, in Proceedings of the 10th Annual ACM Symposium on User Interface Software and Technology, UIST \u201997, pp. 129\u2013138 (ACM, New York, 1997). https:\/\/doi.org\/10.1145\/263407.263531","DOI":"10.1145\/263407.263531"},{"key":"2396_CR35","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1109\/90.851975","volume":"8","author":"L Fan","year":"2000","unstructured":"L. Fan, P. Cao, J. Almeida, A.Z. Broder, Summary cache: a scalable wide-area web cache sharing protocol. IEEE\/ACM Trans. Netw. 8, 281\u2013293 (2000). https:\/\/doi.org\/10.1109\/90.851975","journal-title":"IEEE\/ACM Trans. Netw."},{"key":"2396_CR36","doi-asserted-by":"crossref","unstructured":"D. Jost, U. Maurer, J. Ribeiro, Information-Theoretic Secret-Key Agreement: The Asymptotically Tight Relation Between the Secret-Key Rate and the Channel Quality Ratio: 16th International Conference, TCC 2018, Panaji, India, November 11\u201314, 2018, Proceedings, Part I, pp. 345\u2013369 ( 2018)","DOI":"10.1007\/978-3-030-03807-6_13"},{"key":"2396_CR37","unstructured":"N. Smart, Cryptography: An Introduction,3rd Edition, chap. 5 (Mcgraw-Hill College (December 30, 2004); eBook (3rd Edition, 2013), 2013)"},{"key":"2396_CR38","doi-asserted-by":"publisher","unstructured":"M. Hirt, U. Maurer, V. Zikas, Mpc vs. sfe: Unconditional and computational security, in Proceedings of the 14th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology, ASIACRYPT \u201908, 1\u201318 (Springer, Berlin, 2008). https:\/\/doi.org\/10.1007\/978-3-540-89255-7_1","DOI":"10.1007\/978-3-540-89255-7_1"},{"key":"2396_CR39","doi-asserted-by":"publisher","first-page":"656","DOI":"10.1002\/j.1538-7305.1949.tb00928.x","volume":"28","author":"CE Shannon","year":"1949","unstructured":"C.E. Shannon, Communication theory of secrecy systems. Bell Syst. Tech. J. 28, 656\u2013715 (1949)","journal-title":"Bell Syst. Tech. J."},{"key":"2396_CR40","doi-asserted-by":"publisher","first-page":"295","DOI":"10.1109\/T-AIEE.1926.5061224","volume":"XLV","author":"GS Vernam","year":"1926","unstructured":"G.S. Vernam, Cipher printing telegraph systems for secret wire and radio telegraphic communications. Trans. Am. Inst. Electr. Eng. XLV, 295\u2013301 (1926). https:\/\/doi.org\/10.1109\/T-AIEE.1926.5061224","journal-title":"Trans. Am. Inst. Electr. Eng."},{"key":"2396_CR41","doi-asserted-by":"publisher","first-page":"1355","DOI":"10.1002\/j.1538-7305.1975.tb02040.x","volume":"54","author":"A Wyner","year":"1974","unstructured":"A. Wyner, The wire-tap channel. Bell Syst. Tech. J. 54, 1355\u20131387 (1974)","journal-title":"Bell Syst. Tech. J."},{"key":"2396_CR42","doi-asserted-by":"publisher","first-page":"451","DOI":"10.1109\/TIT.1978.1055917","volume":"24","author":"S Leung-Yan-Cheong","year":"1978","unstructured":"S. Leung-Yan-Cheong, M. Hellman, The gaussian wire-tap channel. IEEE Trans. Inf. Theory 24, 451\u2013456 (1978). https:\/\/doi.org\/10.1109\/TIT.1978.1055917","journal-title":"IEEE Trans. Inf. Theory"},{"key":"2396_CR43","doi-asserted-by":"publisher","first-page":"339","DOI":"10.1109\/TIT.1978.1055892","volume":"24","author":"I Csiszar","year":"1978","unstructured":"I. Csiszar, J. Korner, Broadcast channels with confidential messages. IEEE Trans. Inf. Theory 24, 339\u2013348 (1978). https:\/\/doi.org\/10.1109\/TIT.1978.1055892","journal-title":"IEEE Trans. Inf. Theory"},{"key":"2396_CR44","doi-asserted-by":"publisher","first-page":"733","DOI":"10.1109\/18.256484","volume":"39","author":"M Maurer","year":"1993","unstructured":"M. Maurer, Secret key agreement by public discussion from common information. IEEE Trans. Inf. Theory 39, 733\u2013742 (1993). https:\/\/doi.org\/10.1109\/18.256484","journal-title":"IEEE Trans. Inf. Theory"},{"key":"2396_CR45","doi-asserted-by":"publisher","first-page":"1121","DOI":"10.1109\/18.243431","volume":"39","author":"R Ahlswede","year":"1993","unstructured":"R. Ahlswede, I. Csiszar, Common randomness in information theory and cryptography. I. Secret sharing. IEEE Trans. Inf. Theory 39, 1121\u20131132 (1993). https:\/\/doi.org\/10.1109\/18.243431","journal-title":"IEEE Trans. Inf. Theory"},{"key":"2396_CR46","doi-asserted-by":"publisher","first-page":"344","DOI":"10.1109\/18.825796","volume":"46","author":"I Csiszar","year":"2006","unstructured":"I. Csiszar, P. Narayan, Common randomness and secret key generation with a helper. IEEE Trans. Inf. Theory 46, 344\u2013366 (2006). https:\/\/doi.org\/10.1109\/18.825796","journal-title":"IEEE Trans. Inf. Theory"},{"key":"2396_CR47","unstructured":"P. Hoffman, The man who loved only numbers: The story of Paul Erdos and the search for mathematical truth (1998)"},{"key":"2396_CR48","unstructured":"D.T. Murphy, What, if anything, is epsilon? (2014). https:\/\/pdfs.semanticscholar.org\/da63\/9bc5e88d1ab31da1fb80f020f95e986792b4.pdf. Accesses on: 16th August 2019"},{"key":"2396_CR49","doi-asserted-by":"publisher","first-page":"324","DOI":"10.1049\/ell2.12123","volume":"57","author":"Z Wan","year":"2021","unstructured":"Z. Wan, K. Huang, Y. Lou, Y. Chen, Channel covariance matrix based secret key generation for low-power terminals in frequency division duplex systems. Electron. Lett. 57, 324\u2013327 (2021). https:\/\/doi.org\/10.1049\/ell2.12123","journal-title":"Electron. Lett."},{"key":"2396_CR50","doi-asserted-by":"publisher","unstructured":"S. Mathur, R. Miller, A. Varshavsky, W. Trappe, N. Mandayam, Proximate: Proximity-based secure pairing using ambient wireless signals, in Proceedings of the 9th International Conference on Mobile Systems, Applications, and Services, MobiSys \u201911, pp. 211\u2013224 (ACM, New York, 2011). https:\/\/doi.org\/10.1145\/1999995.2000016","DOI":"10.1145\/1999995.2000016"},{"key":"2396_CR51","doi-asserted-by":"publisher","unstructured":"Q. Wang, H. Su, K. Ren, K. Kim, Fast and scalable secret key generation exploiting channel phase randomness in wireless networks, in 2011 Proceedings IEEE INFOCOM, pp. 1422\u20131430 (2011). https:\/\/doi.org\/10.1109\/INFCOM.2011.5934929","DOI":"10.1109\/INFCOM.2011.5934929"},{"key":"2396_CR52","doi-asserted-by":"publisher","unstructured":"A. Badawy, et\u00a0al. Secret key generation based on AoA estimation for low SNR conditions, vol. 2015 (2015). https:\/\/doi.org\/10.1109\/VTCSpring.2015.7146072","DOI":"10.1109\/VTCSpring.2015.7146072"},{"issue":"2","key":"2396_CR53","doi-asserted-by":"publisher","first-page":"364","DOI":"10.1109\/TIFS.2007.902666","volume":"1","author":"R Wilson","year":"2007","unstructured":"R. Wilson, D. Tse, R.A. Scholtz, Channel identification: Secret sharing using reciprocity in ultra-wideband channels. IEEE Trans. Inf. Forens. Secur. Part 1(2), 364\u2013375 (2007). https:\/\/doi.org\/10.1109\/TIFS.2007.902666","journal-title":"IEEE Trans. Inf. Forens. Secur. Part"},{"key":"2396_CR54","doi-asserted-by":"publisher","unstructured":"M.G. Madiseh, M.L. McGuire, S.S. Neville, L. Cai, M. Hori, Secret key generation and agreement in UWB communication channels, in 2008 IEEE Global Telecommunications Conference (GLOBECOM\u2019 08), pp. 1\u20135 (IEEE, New Orleans, 2008). https:\/\/doi.org\/10.1109\/GLOCOM.2008.ECP.356","DOI":"10.1109\/GLOCOM.2008.ECP.356"},{"key":"2396_CR55","doi-asserted-by":"publisher","unstructured":"M. Guillaud, D.T.M. Slock, R. Knopp, A practical method for wireless channel reciprocity exploitation through relative calibration, in Proceedings of International Symposium on Signal Processing and its Applications (ISSPA \u201905), pp. 403\u2013406 (IEEE, 2005). https:\/\/doi.org\/10.1109\/ISSPA.2005.1580281","DOI":"10.1109\/ISSPA.2005.1580281"},{"key":"2396_CR56","doi-asserted-by":"publisher","first-page":"385","DOI":"10.1109\/JCN.2012.6292245","volume":"14","author":"YEH Shehadeh","year":"2012","unstructured":"Y.E.H. Shehadeh, O. Alfandi, D. Hogrefe, Towards robust key extraction from multipath wireless channels. J. Commun. Netw. 14, 385\u2013395 (2012). https:\/\/doi.org\/10.1109\/JCN.2012.6292245","journal-title":"J. Commun. Netw."},{"key":"2396_CR57","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"22","author":"W Diffie","year":"2006","unstructured":"W. Diffie, M. Hellman, New directions in cryptography. IEEE Trans. Inf. Theory 22, 644\u2013654 (2006). https:\/\/doi.org\/10.1109\/TIT.1976.1055638","journal-title":"IEEE Trans. Inf. Theory"},{"key":"2396_CR58","doi-asserted-by":"crossref","unstructured":"S.T.\u00a0Ali, D.\u00a0Ostry, V.\u00a0Sivaraman. Secret key generation rate vs. reconciliation cost using wireless channel characteristics in body area networks, in 2010 IEEE IFIP 8th International Conference on Embedded and Ubiquitous Computing (EUC) pp. 644\u2013650 ( 2011)","DOI":"10.1109\/EUC.2010.103"},{"key":"2396_CR59","doi-asserted-by":"publisher","first-page":"1453","DOI":"10.3390\/s16091453","volume":"16","author":"P Van Torre","year":"2016","unstructured":"P. Van Torre, Channel-based key generation for encrypted body-worn wireless sensor networks. Sensors 16, 1453 (2016). https:\/\/doi.org\/10.3390\/s16091453","journal-title":"Sensors"},{"key":"2396_CR60","doi-asserted-by":"publisher","unstructured":"K. Argyraki et\u00a0al., Creating secrets out of erasures, pp. 429\u2013440 (2013). https:\/\/doi.org\/10.1145\/2500423.2500440","DOI":"10.1145\/2500423.2500440"},{"key":"2396_CR61","doi-asserted-by":"publisher","unstructured":"T. Kitano, A. Kitaura, H. Iwai, H. Sasaoka, A private key agreement scheme based on fluctuations of BER in wireless communications, in The 9th International Conference on Advanced Communication Technology (Volume: 3), ICACT\u201907, pp. 1495\u20131499. https:\/\/doi.org\/10.1109\/ICACT.2007.358651 (IEEE, 2007)","DOI":"10.1109\/ICACT.2007.358651"},{"key":"2396_CR62","doi-asserted-by":"publisher","unstructured":"M. Strasser, C. P\u00f6pper, S. Capkun, M. Cagalj, Jamming\u2013resistant key establishment using uncoordinated frequency hopping, in  Proceedings of the 2008 IEEE Symposium on Security and Privacy, SP \u201908, pp. 64\u201378 (IEEE Computer Society, Washington, 2008). https:\/\/doi.org\/10.1109\/SP.2008.9","DOI":"10.1109\/SP.2008.9"},{"key":"2396_CR63","doi-asserted-by":"publisher","unstructured":"J.S. Sousa, J.P. Vilela, A characterization of uncoordinated frequency hopping for wireless secrecy, in 7th IFIP Wireless and Mobile Networking Conference, WMNC 2014, Vilamoura, Portugal, May 20\u201322, 2014, pp. 1\u20134 (IEEE, 2014). https:\/\/doi.org\/10.1109\/WMNC.2014.6878885","DOI":"10.1109\/WMNC.2014.6878885"},{"key":"2396_CR64","doi-asserted-by":"publisher","unstructured":"A. Liu, P. Ning, H. Dai, Y. Liu, USD\u2013FH: Jamming-resistant wireless communication using uncoordinated frequency hopping with uncoordinated seed disclosure, in  The 7th IEEE International Conference on Mobile Ad-hoc and Sensor Systems (IEEE MASS 2010), pp. 41\u201350 (IEEE, San Francisco, 2010). https:\/\/doi.org\/10.1109\/MASS.2010.5663968","DOI":"10.1109\/MASS.2010.5663968"},{"key":"2396_CR65","first-page":"26","volume":"2","author":"P Manjola","year":"2013","unstructured":"P. Manjola, S. Sharmila, Anti-jamming broadcast communication using un-coordinated frequency hopping. Int. J. Appl. Innov. Eng. Manag. (IJAIEM) 2, 26\u201328 (2013)","journal-title":"Int. J. Appl. Innov. Eng. Manag. (IJAIEM)"},{"key":"2396_CR66","first-page":"2053","volume":"2","author":"G Sona","year":"2014","unstructured":"G. Sona, P. Annapandi, A. Shinney, Establishing adversary resistant communication in wireless network. Int. J. Innov. Res. Comput. Commun. Eng. 2, 2053\u20132058 (2014)","journal-title":"Int. J. Innov. Res. Comput. Commun. Eng."},{"key":"2396_CR67","doi-asserted-by":"publisher","unstructured":"M. Elsabagh, Y. Abdallah, M. Youssef, H. El Gamal, ARQ security in wi-fi and rfid networks, in 2010 48th Annual Allerton Conference on Communication, Control, and Computing (Allerton), pp. 1212\u20131219 (2010). https:\/\/doi.org\/10.1109\/ALLERTON.2010.5707052","DOI":"10.1109\/ALLERTON.2010.5707052"},{"key":"2396_CR68","doi-asserted-by":"publisher","unstructured":"Y.S. Khiabani, S. Wei, ARQ-based key scheduling algorithm over correlated erasure channels, in 31st IEEE Military Communications Conference, MILCOM 2012, Orlando, FL, USA, October 29\u2013November 1, 2012, pp. 1\u20136 (2012). https:\/\/doi.org\/10.1109\/MILCOM.2012.6415667","DOI":"10.1109\/MILCOM.2012.6415667"},{"key":"2396_CR69","doi-asserted-by":"publisher","unstructured":"Jafari Siavoshani, M., Fragouli, C., Diggavi, S., Pulleti, U. & Argyraki, K. Group secret key generation over broadcast erasure channels, in 2010 Conference Record of the Forty Fourth Asilomar Conference on Signals, Systems and Computers, pp. 719\u2013723 (2010). https:\/\/doi.org\/10.1109\/ACSSC.2010.5757657","DOI":"10.1109\/ACSSC.2010.5757657"},{"key":"2396_CR70","doi-asserted-by":"publisher","unstructured":"L. Czap, C. Fragouli, Secure key exchange in wireless networks, in 2011 International Symposium on Networking Coding, pp. 1\u20136. https:\/\/doi.org\/10.1109\/ISNETCOD.2011.5978921 ( 2011)","DOI":"10.1109\/ISNETCOD.2011.5978921"},{"key":"2396_CR71","unstructured":"A. Gakhov, Probabilistic Data Structures and Algorithms for Big Data Applications (Books on Demand, 2019)"},{"key":"2396_CR72","doi-asserted-by":"publisher","first-page":"2254","DOI":"10.1109\/TNET.2018.2869851","volume":"26","author":"J Lu","year":"2018","unstructured":"J. Lu et al., Low computational cost bloom filters. IEEE\/ACM Trans. Netw. 26, 2254\u20132267 (2018). https:\/\/doi.org\/10.1109\/TNET.2018.2869851","journal-title":"IEEE\/ACM Trans. Netw."},{"key":"2396_CR73","unstructured":"J. Honorof, An examination of bloom filters and their applications. https:\/\/cs.unc.edu\/~fabian\/courses\/CS600.624\/slides\/bloomslides.pdf (2006)"},{"key":"2396_CR74","unstructured":"L. Carrea, A. Vernitski, M. Reed, Yes-no bloom filter: a way of representing sets with fewer false positives. CoRR arXiv:1603.01060 (2016)"},{"key":"2396_CR75","doi-asserted-by":"publisher","unstructured":"D. Clayton, C. Patton, T. Shrimpton, Probabilistic data structures in adversarial environments, pp. 1317\u20131334. https:\/\/doi.org\/10.1145\/3319535.3354235 (2019)","DOI":"10.1145\/3319535.3354235"},{"key":"2396_CR76","doi-asserted-by":"crossref","unstructured":"H. Krawczyk, P. Eronen, HMAC-based extract-and-expand key derivation function (HKDF), in Request for Comments (RFC) 5869. IBM Research and Nokia (Internet Engineering Task Force (IETF), 2010)","DOI":"10.17487\/rfc5869"},{"key":"2396_CR77","unstructured":"A.B. Cloud, The master, managed, ad-hoc, and monitor modes of the wireless network adapter (2018). https:\/\/topic.alibabacloud.com\/a\/the-master-managed-ad-hoc-and-monitor-modes-of-the-wireless-network-adapter_8_8_32140912.html. Last accessed on 30 June 2022"},{"key":"2396_CR78","unstructured":"Parth. Difference\u2014promiscuous vs. monitor mode (wireless context) (2008). http:\/\/lazysolutions.blogspot.com\/2008\/10\/difference-promiscuous-vs-monitor-mode.html. Last Accessed on 30 June 2018"},{"key":"2396_CR79","unstructured":"T. Hurst, Bloom filters calculator. Last updated: 15th 2018. Accessed on Dec. 2018"},{"key":"2396_CR80","doi-asserted-by":"crossref","unstructured":"P. Chatzimisios, A.C. Boucouvalas, V. Vitsas, Performance analysis of IEEE 802.11 DCF in presence of transmission errors, in 2004 IEEE International Conference on Communications IEEE (Cat. No.04CH37577), vol. 7, pp. 3854\u20133858 (2004)","DOI":"10.1109\/ICC.2004.1313274"},{"key":"2396_CR81","unstructured":"G. Anderson, Bit Error Rate and Capacity Estimation in Wireless Networks. Ph.D. dissertation, Drexel University, Philadelphia (2011). http:\/\/hdl.handle.net\/1860\/3430"},{"key":"2396_CR82","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1016\/S1005-8885(08)60019-9","volume":"14","author":"W Jiang","year":"2007","unstructured":"W. Jiang, Y. Ma, Bit error rate analysis of wi-fi and Bluetooth under the interference of 2.45 ghz RFID. J. China Univ. Posts Telecommun. 14, 89\u201393 (2007). https:\/\/doi.org\/10.1016\/S1005-8885(08)60019-9","journal-title":"J. China Univ. Posts Telecommun."},{"key":"2396_CR83","unstructured":"ck12. Probability using a venn diagram and conditional probability. URL https:\/\/www.ck12.org\/probability\/venn-diagrams\/lesson\/Probability-Using-a-Venn-Diagram-and-Conditional-Probability-ALG-II\/. Accessed 20th Jan 2020"},{"key":"2396_CR84","doi-asserted-by":"publisher","first-page":"78","DOI":"10.1109\/5992.919271","volume":"3","author":"WJ Thompson","year":"2001","unstructured":"W.J. Thompson, Poisson distributions. Comput. Sci. Eng. 3, 78\u201382 (2001)","journal-title":"Comput. Sci. Eng."},{"key":"2396_CR85","unstructured":"M343:applications of probability, modeling events in time and space (2012). https:\/\/www.open.edu\/openlearn\/ocw\/pluginfile.php\/1118700\/mod_resource\/content\/3\/Modelling%20events%20in%20time_m343_1.pdf. Accessed 20th Jan 2020"},{"key":"2396_CR86","unstructured":"Stone_Horse. Group key renewal ( 2022). TP-Link (Home Network Community), Last edited on 2022-12-03 21:59:33. Access on 20th March, 2024"},{"key":"2396_CR87","doi-asserted-by":"publisher","first-page":"423281","DOI":"10.1155\/2010\/423281","volume":"2010","author":"F Falcone","year":"2010","unstructured":"F. Falcone, P. Trimintzios, G. Georgiou, Wifi and wimax secure deployments. J. Comput. Syst. Netw. Commun. 2010, 423281 (2010). https:\/\/doi.org\/10.1155\/2010\/423281","journal-title":"J. Comput. Syst. Netw. Commun."},{"key":"2396_CR88","unstructured":"Renewing the aacs encryption key. Online. $$\\copyright$$ 2022 Sony Interactive Entertainment Inc"},{"key":"2396_CR89","unstructured":"P. McHenry, Wpa2 default key renewal ( 2012). Last edited on 2021-07-03 10:50 PM, Access on 20th March, 2024"},{"key":"2396_CR90","unstructured":"S. Posea, Renewal Periods for Cryptographic Keys. Master\u2019s thesis, Eindhoven University of Technology (2012). Master\u2019s Thesis, Access on 20th March, 2024"},{"key":"2396_CR91","unstructured":"K.\u00a0S. do\u00a0Prado Kelvin Salton\u00a0do Prado, Understanding time complexity with python examples (2019). An electronic medium publication sharing concepts, ideas, and codes, Accessed on 20th Aug. 2020"},{"key":"2396_CR92","unstructured":"T.H. Cormen, C. Stein, R.L. Rivest, C.E. Leiserson, Introduction to Algorithms, chap. 31. Number Theoretic Algorithms, 2nd edn., pp. 849\u2013896 (McGraw-Hill Higher Education, 2001)"},{"key":"2396_CR93","doi-asserted-by":"publisher","unstructured":"Y.E.H. Shehadeh, O. Alfandi, K. Tout, D. Hogrefe, Intelligent mechanisms for key generation from multipath wireless channels, in 2011th Wireless Telecommunications Symposium (WTS), pp. 1\u20136 (IEEE, New York City, 2011). https:\/\/doi.org\/10.1109\/WTS.2011.5960848","DOI":"10.1109\/WTS.2011.5960848"},{"key":"2396_CR94","doi-asserted-by":"publisher","unstructured":"G. Merline; R. C. Porselv, Addressing the temporal correlation in wireless channel for secure communication, in 2013 International Conference on Communications and Signal Processing (ICCSP), pp. 428\u2013432 (IEEE, Melmaruvathur, 2013). https:\/\/doi.org\/10.1109\/iccsp.2013.6577089","DOI":"10.1109\/iccsp.2013.6577089"},{"key":"2396_CR95","doi-asserted-by":"publisher","unstructured":"Y. Dong, Y. Tang, K.Z. Shenzhen, Improved joint antenna selection and user scheduling for massive MIMO systems, in 16th IEEE\/ACIS International Conference on Computer and Information Science, ICIS 2017, Wuhan, China, May 24\u201326, 2017, pp. 69\u201374. https:\/\/doi.org\/10.1109\/ICIS.2017.7959971 (2017)","DOI":"10.1109\/ICIS.2017.7959971"},{"key":"2396_CR96","unstructured":"S. Chen, Accurate acquisition of MIMO channel state information: How big the problem. University of Southampton lecture in ELEC6014 AWCNSs: Advanced Topic Series (2014)"},{"key":"2396_CR97","unstructured":"D.F.S. Murga, Feedback of Channel State Information in Multi-Antenna Systems Based on Quantization of Channel Gram Matrices. Ph.D. dissertation, Universitat Polit\u2018ecnica de Catalunya (UPC) (2012)"},{"key":"2396_CR98","first-page":"209","volume":"2","author":"MN Hemavathi","year":"2014","unstructured":"M.N. Hemavathi, V.K. Annapurna, A survey on secret key extraction using received signal strength in wireless networks. Int. J. Recent Innov. Trends Comput. Commun. 2, 209\u2013213 (2014)","journal-title":"Int. J. Recent Innov. Trends Comput. Commun."},{"key":"2396_CR99","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/comst.2016.2553452","volume":"PP","author":"A Zanella","year":"2016","unstructured":"A. Zanella, Best practice in RSS measurements and ranging. IEEE Commun. Surv. Tutor. PP, 1 (2016). https:\/\/doi.org\/10.1109\/comst.2016.2553452","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"2396_CR100","doi-asserted-by":"publisher","unstructured":"G. Revadigar, C. Javali, H.J. Asghar, K.B. Rasmussen, S. Jha, iARC: Secret key generation for resource constrained devices by inducing artificial randomness in the channel, in Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security, ASIA CCS \u201915, Singapore, April 14\u201317, 2015, p. 669 (2015). https:\/\/doi.org\/10.1145\/2714576.2714644","DOI":"10.1145\/2714576.2714644"},{"key":"2396_CR101","doi-asserted-by":"publisher","unstructured":"G. Margelis, et\u00a0al. Efficient DCT-based secret key generation for the internet of things. Ad Hoc Netw. 92, 101744 (2019). https:\/\/doi.org\/10.1016\/j.adhoc.2018.08.014. Special Issue on Security of IoT-enabled Infrastructures in Smart Cities","DOI":"10.1016\/j.adhoc.2018.08.014"},{"key":"2396_CR102","unstructured":"S. Hegde, Introduction to Computational Complexity Theory. Department of Computer Science and Automation, Indian Institute of Science, India (2014). http:\/\/drona.csa.iisc.ernet.in\/~chandan\/courses\/complexity14\/notes\/lec1.pdf. Accessed on 25th Aug 2017"},{"key":"2396_CR103","unstructured":"J. Boer, Direct sequence spectrum: Physical layer specification IEEE 802.11. Tech. Rep., New Jersey, USA (1996)"},{"key":"2396_CR104","unstructured":"M. Strasser, Novel Techniques for Thwarting Communication Jamming in Wireless Networks. Ph.D. dissertation, ETH ZURICH (2009)"},{"key":"2396_CR105","unstructured":"M. Cagalj, Jamming-resistant key establishment using uncoordinated frequency hopping (2009). feihu.eng.ua.edu\/NSF_CPS\/year2\/W5_3_slides.ppt. Accessed on 18th August 2017"},{"key":"2396_CR106","doi-asserted-by":"publisher","first-page":"1223","DOI":"10.1109\/26.153367","volume":"40","author":"R Morrow","year":"1992","unstructured":"R. Morrow, J. Lehnert, Packet throughput in slotted ALOHA DS\/SSMA radio systems with random signature sequences. IEEE Trans. Commun. 40, 1223\u20131230 (1992)","journal-title":"IEEE Trans. Commun."},{"key":"2396_CR107","doi-asserted-by":"publisher","first-page":"1413","DOI":"10.1109\/26.729381","volume":"46","author":"J Robert","year":"1998","unstructured":"J. Robert, K. Morrow, Accurate CDMA BER calculations with low computational complexity. IEEE Trans. Commun. 46, 1413\u20131417 (1998)","journal-title":"IEEE Trans. Commun."},{"key":"2396_CR108","doi-asserted-by":"publisher","first-page":"2061","DOI":"10.1109\/TCOMM.2007.908511","volume":"55","author":"L Szczecinski","year":"2007","unstructured":"L. Szczecinski, H. Xu, X. Gao, R. Bettancourt, Effcient evaluation of BER for arbitrary modulation and signaling in fading channels. IEEE Trans. Commun. 55, 2061\u20132064 (2007)","journal-title":"IEEE Trans. Commun."},{"key":"2396_CR109","doi-asserted-by":"publisher","first-page":"2809","DOI":"10.3390\/electronics12132809","volume":"12","author":"Y Zhao","year":"2023","unstructured":"Y. Zhao et al., A review of cuckoo filters for privacy protection and their applications. Electronics 12, 2809 (2023)","journal-title":"Electronics"},{"key":"2396_CR110","doi-asserted-by":"crossref","unstructured":"B. Fan, D.G. Andersen, M. Kaminsky, M.D. Mitzenmacher, Cuckoo filter: practically better than bloom, in Proceedings of the 10th ACM International on Conference on emerging Networking Experiments and Technologies, pp. 75\u201388 (2014)","DOI":"10.1145\/2674005.2674994"}],"container-title":["EURASIP Journal on Wireless Communications and Networking"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13638-024-02396-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1186\/s13638-024-02396-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13638-024-02396-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,27]],"date-time":"2024-08-27T12:06:21Z","timestamp":1724760381000},"score":1,"resource":{"primary":{"URL":"https:\/\/jwcn-eurasipjournals.springeropen.com\/articles\/10.1186\/s13638-024-02396-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,8,27]]},"references-count":110,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2024,12]]}},"alternative-id":["2396"],"URL":"https:\/\/doi.org\/10.1186\/s13638-024-02396-y","relation":{"has-preprint":[{"id-type":"doi","id":"10.21203\/rs.3.rs-3908190\/v1","asserted-by":"object"}]},"ISSN":["1687-1499"],"issn-type":[{"value":"1687-1499","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,8,27]]},"assertion":[{"value":"19 February 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 August 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 August 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"There is no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"66"}}